Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 8 Sep 2001 21:08:12 -0400 (EDT)
From:      "Andrew R. Reiter" <arr@watson.org>
To:        Kris Kennaway <kris@obsecurity.org>, bright@mu.org, bde@zeta.org.au
Cc:        security@freebsd.org
Subject:   Re: netbsd vulnerabilities
Message-ID:  <Pine.NEB.3.96L.1010908210131.14583A-100000@fledge.watson.org>
In-Reply-To: <Pine.NEB.3.96L.1010908063851.9148A-200000@fledge.watson.org>

next in thread | previous in thread | raw e-mail | index | archive | help


So, I'd like to bring this to conclusion as this bug sucks :-(  So, I
propose that the patch I submitted is "ok" (:-)) b/c it #1 solves the
unsigned -> int -> unsigned (copyin call) issue, and #2 conforms to what
is specified in the man page _and_ in sys/sys/sem.h.  However, if this is
not the correct usage of semop(), ie. we don't want to have it unsigned,
then we must #1 fix to check < 0 for the vuln, #2 fix the man page, #3 fix
code that was written to the man page spec, and #4 fix sys/sys/sem.h.

Thoughts?  

Andrew

*-------------.................................................
| Andrew R. Reiter 
| arr@fledge.watson.org
| "It requires a very unusual mind
|   to undertake the analysis of the obvious" -- A.N. Whitehead


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.96L.1010908210131.14583A-100000>